|Publication number||US7234160 B2|
|Application number||US 09/858,328|
|Publication date||19 Jun 2007|
|Filing date||15 May 2001|
|Priority date||20 Sep 2000|
|Also published as||CA2347581A1, CA2347581C, US8225388, US20020035684, US20070277229|
|Publication number||09858328, 858328, US 7234160 B2, US 7234160B2, US-B2-7234160, US7234160 B2, US7234160B2|
|Inventors||Robert Vogel, Daniel Franz, Robert Klingenberg, Dave Barnes, Chris Schenken|
|Original Assignee||United Parcel Services Of America, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (23), Non-Patent Citations (4), Referenced by (49), Classifications (18), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present application claims the full benefit and priority of pending provisional application No. 60/233,862, filed Sep. 20, 2000, entitled Method and Apparatus for Authorizing the Transfer of Information.” The entirety of this provisional application is incorporated by reference.
The present invention relates generally to transfer of information, and particularly relates to the management delivery of privileged information.
The personal delivery of items such as parcels has long been known in the art. As an example, United Parcel Service (a.k.a. “UPS”) the assignee of the present application, ships nearly 13 million packages and documents each day through a network, which has been carefully engineered to provide speed, reliability, and efficiency. The first step in the process is pickup. UPS delivery drivers are assigned a specific route, making regularly scheduled stops along the route. Typically, the driver delivers packages in the morning, and picks up packages in the afternoon. Large-volume customers, who might ship thousands of packages a day, may have a UPS tractor-trailer stationed on site. Lower-volume customers, who might ship as few as 2–5 packages a week, are served by the familiar UPS delivery truck. Customers with urgent shipments of Next Day Air letters or packages can call UPS for On-Call Air Pick Up. Using state-of-the-art communications technology, On-Call Air dispatchers locate the nearest package car and electronically dispatch it to the customer location for “just in time” pickup. Occasional customers can drop off their packages at conveniently located UPS letter centers and service counters.
To transport packages most efficiently, UPS has developed an elaborate network of “hubs” or central sorting facilities located throughout the world. Each hub is “fed” by a number of local operating centers, which serve as home base for UPS pickup and delivery vehicles. Packages from the local operating center are transported to the hub, usually by tractor-trailer and are unloaded. The packages are sorted by ZIP code and consolidated on conveyor belts. Packages bound for a specific geographical region are all consolidated on the same conveyor belt. Then packages are routed to either an out-bound trailer for local delivery, or to a delivery truck serving the immediate area. Before being loaded, each package is checked one last time, just to make sure it has been sorted correctly.
To transport packages between hubs, UPS uses tractor-trailers, called feeders, to transport thousands of packages from the hub where the package originated, to the hub nearest the package's destination. This is known as the ground feeder network.
Each UPS driver delivers up to 500 packages a day, including express packages which must be delivered by 10:30 a.m. This process requires careful planning and teamwork. At the hub, packages are loaded onto delivery trucks in the same order in which they will be delivered. This process is called the “preload.” By delivering packages in sequence, from one address to the next closest address, drivers complete their assigned routes as quickly and productively as possible. In 1991, UPS became the first package delivery company to gather signatures electronically and have Saturday Delivery. Using a hand-held computer device called a DIAD (Delivery Information Acquisition Device), the driver electronically captures information about each package, including the time of delivery and even the signature of the person receiving the package.
As may be understood, the delivery of such items requires a significant investment in logistics, not only to perform the delivery service but to provide the customer with information regarding the items while they are in transit, a.k.a. “online tracking”. In 1994, UPS's Web site made its debut and for the first time in UPS history, on Dec. 22, 1998, online tracking requests for www.ups.com exceeded one million. At the time of filing of this application, UPS was delivering approximately 12.9 million packages and documents a day for 1.8 million regular customers and averages more than two million on-line tracking requests per day on its Web site.
Although such tracking features indeed have advantages, the need for improvements always exists.
The present invention overcomes deficiencies in the prior art by providing a password or “PIN”-based system for managing delivery of privileged or “enhanced” information, which utilizes “third-party” authorization. this concept may be used in conjunction with parcel delivery information but is also contemplated for use in other areas such as credit card information, personal records, etc.
In one embodiment this system includes the use of three separate parties, a First Party, a Second Party, and a Third Party. It should be understood that these three parties are all part of a cooperating relationship. This is to distinguish “unauthorized third parties”, which are not part of the relationship and in fact are to be excluded.
The First Party initially “registers” with the Second Party by providing self-authenticating basic registration information. This registration provides the First Party with a first set of privileges.
The First Party may then ask for a PIN number (a.k.a. a “password”) in order to obtain a second set of privileges to observe information held, controlled, or otherwise made available by the Second Party which is related to a Third Party. In requesting the PIN, the First Party must provide additional registration information to the Second Party relating to the Third Party, which the Second Party can authenticate. The Second Party then forwards the PIN request to the Third Party along with the First Party's basic registration information. The Third Party then can decide whether to forward the PIN to the First Party. If the PIN is so forwarded, the First Party then may use the PIN to gain the requested additional access privileges. The second set of privileges can be dynamically modified by the Third Party.
Therefore it is an object of the present invention to provide an improved information management system.
It is a further object of the present invention to provide an improved information management system which is effective.
It is a further object of the present invention to provide an improved information management system which is efficient.
It is a further object of the present invention to provide an improved information management system which is cost-effective.
It is a further object of the present invention to provide an improved information management system which can be used to manage information relating to parcels.
It is a further object of the present invention to provide an improved information management system which can be used to manage information relating to parcels in transit.
It is a further object of the present invention to provide an improved information management system which can be used to manage information relating to medical records.
It is a further object of the present invention to provide an improved information management system which can be used to manage information relating to personal records.
It is a further object of the present invention to provide an improved information management system which can be used to manage information relating to personnel records.
Other objects of the present invention will become apparent in reading the specification and claims.
As will be seen, the present application discusses various concepts which relate to the use of information. Many of these issues may relate to the use, processing, transfer, handling, passing on, or release of information which may or may not be considered to be sensitive, private, or personal. The proper treatment of such information should be addressed under the associated privacy laws or other similar laws (such laws vary widely according to the types of information and according to the various locales), and should not be limited or expanded
Reference is now made to the drawings, in which like numerals indicate like elements throughout the several views.
Generally described, the present invention provides a PIN-based mechanism for managing delivery of privileged information, which utilizes “third-party” authorization. In one embodiment this system includes the use of three separate parties, a First Party, a Second Party, and a Third Party. The First Party initially “registers” with the Second Party by providing self-authenticating basic registration information. This registration provides the First Party with a first set of privileges.
The First Party may then ask for a PIN number in order to obtain a second set of privileges to observe information provided by the Second Party which is related to a Third Party in some manner (e.g., personal information such as medical records). In requesting the PIN, the First Party must provide additional registration information to the Second Party relating to the Third Party, which the Second Party can authenticate. The Second Party then forwards the PIN request to the Third Party along with the First Party's basic registration information. The Third Party then can decide whether to forward the PIN to the First Party. If the PIN is so forwarded, the First Party then may use the PIN to gain the requested additional access privileges. The second set of privileges can be dynamically modified by the Third Party.
In one particular embodiment, the present invention provides a PIN-based mechanism for managing delivery of privileged parcel tracking information from a web site such as UPS.com. A Requester is the First Party, UPS is the Second Party, and a Shipper is the Third Party.
More Detailed Discussion
The present invention now will be described more fully hereinafter with reference to the above-described drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
The system according to the present invention (a.k.a. “UPS Signature Tracking™) allows individuals to view proof of additional or “enhanced” delivery information beyond “core” information which is (in one embodiment) available to any visitor to a suitable website (e.g., www.UPS.com) who clicks on or otherwise selects a suitable “track” link and enters a tracking number. Specifically, in one embodiment, the “core” information is basic information such as whether the delivery was made or not. The “enhanced” information available can include the following:
The “Requestors” who will be viewing the information are persons who have requested and have been forwarded a Personal Identification Number (“PIN”) by a UPS shipper. Specifically, it is expected that the individuals requesting a PIN will be (i) employees, representatives and third party billing administrators of a UPS shipper and (ii) employees and representatives of recipients of packages from a UPS shipper. It is expected that individuals will typically be registering for Signature Tracking in the capacity of professionals only (not consumers).
Registration for Signature Tracking can be available through a website such as MYUPS.com, which in turn has its own registration process. Required information at the MYUPS.com registration can include name, street address, city, postal code, state or country, phone number and email address. This could be considered “self-authentication” registration. At this time, the user may opt out of receiving from UPS information about service updates and MYUPS.com enhancements.
Upon entry of the requested information, a web page (not shown) is provided to confirm that the user has registered. The user is then directed through suitable links to allow the customer to login by going to a page such as
Registration for Signature Tracking (Step 2)
To register for UPS Signature Tracking from the MYUPS.com website, the user must click on a link such as “View MYUPS.com”. A drop-down menu will appear, and one of the options is “Request Signature Tracking”. When the user selects “Request Signature Tracking” a clickwrap agreement appears. The user must scroll through the Agreement and click an “I Accept” button at the bottom. When the user presses the “I Accept” button, the user is presented with a registration form through which the user requests a PIN for access to Signature Tracking.
The user must then enter the following information:
1) a UPS account number (the UPS shipper number). This may be the account number of the user's employer, an entity from whom the user receives packages, or another UPS shipper who is willing to forward to that user a PIN.
2) a postal code that corresponds to the pick-up location of the UPS shipper whose account number was entered by the user. As discussed later, UPS can then cross-check this information with the information gathered at Step #1 above. It should also be understood that UPS periodically updates such location information, so this provides a “hard check” to confirm the accuracy of the location data provided by the requestor.
3) in the “In Care of” field, the title of the appropriate person at the UPS shipper location who is the manager of the UPS account. As shown in FIG., 10, the choices shown are Shipping Manager, Customer Service Manager, Distribution Manager, Mailroom Manager, Traffic Manager and Transportation Manager. This is also an important feature of the invention.
Note that the choices above can be those these set by the Second Party or can they differ for each account. In case of the latter this could be also said to be a selection of a PIN administrator by the user of a selection of PIN administrator groups designated by the shipper.
This selection could also be set by the administrator to a default address that will apply to all requesters.
Essentially these titles are generic and the initial group of titles is made available within the application at the user interface level. Titles can change depending on the most common business terminology. However, the address the PIN is sent to is based on direct feedback from the customer. This information is provided to the account executives of Party Two when an account is initially set up and may be updated from time to time depending on changes. This information is captured as the normal business process in establishing a formal relationship between entities. Also, the PIN letter addressee can change the PIN letter name & address by contacting the support staff of the Second Party. In this case they can designate a specific name as well as address for all PINs to go to.
Referring back again to the web page of
The dotted lines in
The letter on the left of
The letter on the right of
It is important to note that the person/entity forwarding the PIN will not know the MYUPS.com login password which will need to be used by the requesting party with the PIN to activate signature tracking.
Requestor Receives PIN from Shipper's Representative (Step 4)
Activation of PIN (Step 5)
Generally described, Step 5 of the six step process is then accomplished when the customer, now having the PIN, then logs into a suitable web site such as shown in
Described in further detail, when (and if) the requester (the First Party) receives a PIN from the Manager (the Third Party), the Requestor must log into MYUPS.com (the Second Party), select “View MYUPS.com” and further select “Activate Signature Tracking” from the drop-down menu. The Requestor will be prompted to enter the PIN. The Requestor will not need to enter a PIN again at a later time; the Requestor's username will be flagged as having access to Signature Tracking.
The requestor(a.k.a. “user”) is then advised that they may now access the above information with a particular account, in this case account number 123456. The user can then return to the UPS.COM home page. The user is again allowed to select an associated web site to access the privileged information, which in this case can be MY UPS.COM.
Reference is again made to
A web page (not shown) can be used provided to the user to allow the customer to review frequently asked questions regarding the tracking feature provided by the invention. Another web page (not shown) can be used which allows the user to use e-mail to provide questions regarding the service. It may also be noted that the 1–800 number may be used to allow a shipper to designate a specific address to send PINs to for or some or all of their UPS account numbers.
Use of the PIN; Characteristics (Step 6)
As noted elsewhere in this application in one embodiment, the PIN, when granted, grants access to Full Delivery Address, Signature Image, COD Information, and Customer Reference Numbers, although other information may likewise be included as discussed elsewhere in this application.
Note that a PIN is entered only once and allows a single ID to access ONE shipper number. If additional shipper numbers are needed, that ID must complete another request for a PIN for that shipper number.
Thus PINs are unique to each user and based on a User ID/Shipper Number relationship, although multiple PINS may be used by a single user.
As noted above, the use of a PIN-based mechanism allows the managing of delivery of privileged tracking information from UPS.com. Under one embodiment of the present invention, PINs are for registered MyUPS.com users only. Note, however, that if the PIN is not granted to the requester, the requestor is still able to independently use MYUPS.com.
Note however that the PIN can be retired at any time. Under one embodiment it is set up so that the PIN will expire in two years. Note that a warning is also used to warn customers that a PIN is about to expire. A PIN could also be set up to be used just once.
The Shipper's PIN Administrator
One feature of the present invention includes the use of one or more designated “PIN administrators”.
Note that with respect to functionality, at least some shippers can call an 800 number to request that all PIN requests be sent to a single contact and location for any or all of their shipper numbers.
Suppression of Selected Data Fields
At the shipper's request or at the discretion of UPS (the “Second Party”), UPS may choose to suppress certain information for a particular UPS shipper. UPS can manually enable and disable services and privileges through the Administrator interface. UPS can turn on/off any of the available features by country, UPS Account Number, or Individual membership ID, or globally.
Any one of the features available may be toggled on/off according to a particular user, a country, an account number, or globally.
It should be understood that this filtering process allows different shippers (“Third Parties”) to adapt the system according to their own particular needs and sensitivities; one Shipper may be sensitive only to COD information whereas another shipper may be sensitive to signature information. The invention allows multiple people to turn off different things depending on their particular sensitivities.
Integration with MY UPS.COM
It may be understood that the PIN-based system according to the present invention is available to all MY UPS.COM registered users, and thus can benefit from the vast amount of experience relating to same.
It should be understood that Signature Tracking Users will be accessing and receiving the proof of delivery data from the UPS server over a secure SSL line. UPS has taken a leadership technology position by offering security for enhanced delivery information display via the Web.
It may thus be seen that there are several different layers of security provided under the present invention. This includes
This could be otherwise known as monitoring. Reports may be used, which can be generated automatically or upon request, which provide the authorizing “third” party with some indication of whether or not there authorized information is being used as expected, or is being used in excess possibly for developing a database.
For example, the third Party could be given a report with all of its associated “Party One” information, indicating what each of those parties are doing.
This reporting could be done by volume of inquiries, although other types of reporting could be done, such as by volume of data, transferred or other suitable means.
The ability to monitor may be an advantageous feature for the Third Party, and may determine whether or not the Third Party engages the overall relationship.
A key benefit to the shipper is that they have control over who does and does not get access to enhanced delivery information.
The shippers have control over who accesses and views enhanced delivery information including: digital signature, COD amount, full delivery address and reference numbers. Furthermore, the shipper has the ability to turn the privileges off for a single user ID or for all user IDs by data element (digital signature, COD, full delivery address). Knowing the ID is critical to this capability.
The invention should reduces CSC call volume and related costs for all parties involved. Improved customer service representative response times and accounting processing time are also provided.
The shippers are also provided with the flexibility to turn off certain enhanced information such as digital signature, COD and full delivery address. The shipper's internal costs are also reduced.
One unique aspect of the invention is that, with respect to parties 1, 2, and 3, (a.k.a. First Party, Second party, Third Party) none of these parties has to go out and search to locate the other two parties in order create the relationship. For instance, Party One does not have to know everything about Party 3 in order find out about Party 3. Also, with respect to Party 3, Party 3 may want their information to be found out, but under this model Party 3 does not necessarily have to go out and “seek” such parties.
One of the values of the model under the present invention is that Party 3 may not know anything about Party 1, but due to the establishing of the relationships, but eventually Party 3 will know something about Party 1, by the fact that Party 1 has made a request to find out about the relationship between Parties 2 and 3.
With respect to
Relationship B of
Use In Other Environments
It should be understood that the above-described invention could be used as a stand-alone The invention may also be used within a variety of environments in which sensitive information is used.
Reference is now made to a three-party scenario involving medical records.
Party One is the Requester of the medical records. This could be a variety of individuals, such as a doctor, attorney, family member or agent.
Party Two is the Records Holder, which in this case could be a hospital records keeper.
Party Three is the authorizing party, which in this case can be a hospital patient or an authorized agent, whose records are being held by Party Two. In another embodiment this could be a hospital administrator which has established a relationship with the client.
This could also be applied to a credit information example, with the example being where a potential auto purchaser (“Purchaser”—Party Three) approaches an auto dealer (“Dealer”—Party One) regarding the purchase of an automobile. In order to evaluate the credit of Purchaser, Dealer wishes to engage the service of a credit information agency (Credit Reporter—Party Two), in order to review certain credit records of the Purchaser.
The Dealer (Party One) registers with the Credit Reporter (Party Two). The Dealer (Party One) then further submits a PIN request to the Credit Reporter (Party Two) to access certain records of the Purchaser (Party Three). The PIN is passed on to the Purchaser (Party Three) who then forwards it to the Dealer (Party One).
One notable feature of the above concept is that the credit information is not made available to all dealers of automobiles, only the dealer selected by the purchaser. It should also be noted that the selected access of information again can be filtered by the purchaser. As an example, the purchaser could restrict access to certain credit information and release other information.
Other Areas where Invention can be Used
An “E—Toy” example is as follows. A customer wants to use a Visa account to buy from E—toy. E—Toy is Party One—it sends of a PIN request to Visa (Party Two), who sends a PIN request to the customer (Party Three), who can forward it if so desired.
Domestic services (such as nannies) could be provided as follows. A nanny is Party Three. A nanny service is Party Two. A parent (needing a nanny) could be Party One. In order to get information regarding the nanny, the parent may make a PIN request to the nanny service who, passes it on to be nanny. Dating services could also be similarly provided.
Clarification of Certain Terms
It may be understood that information about one party may be thought of as that party's “information”, and that party may have an “interest” in that information. As an example a “First Party” may have an interest in the dissemination of First Party Information which is medically-related; that interest may be that such information should be kept in strict confidence when at all possible. That interest may instead be an interest that the First Party Information, while it can be disseminated more freely, must be accurate. The fact that someone has an “interest”in information does not necessarily mean that they own or do not own the information. Such an interest can take many different forms and in fact can vary for each user and can vary due to local or national law or regulations.
If something is “facilitated”, it is made possible. As an example, a request from one party to a second party can be “facilitated” by the second party (or anyone for that matter) providing the necessary computer systems to allow the first party to “go onto the internet”, and by entering requisite information on a form, issuing a request to the second party. The forwarding of such a request can also be similarly done by use of a computer or other automated means.
Information can be “held” by a party by storing the information on computer or other suitable storage devices. Such “holding” can be on the premises of the holder, or can be at the direction of the holder at a remote location.
Hand delivery includes actual delivery of an item to a physical address and does not include emails.
An authorization code can include a PIN.
Many modifications and other embodiments of the invention will come to mind to one skilled in the art to which this invention pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5325294 *||29 Jun 1992||28 Jun 1994||Keene Sharon A||Medical privacy system|
|US5481720||14 Sep 1994||2 Jan 1996||International Business Machines Corporation||Flexible interface to authentication services in a distributed data processing environment|
|US5554842 *||22 Dec 1994||10 Sep 1996||Pitney Bowes Inc.||Luminescent facing marks for enhanced postal indicia discrimination|
|US5706427||27 Jun 1996||6 Jan 1998||Cadix Inc.||Authentication method for networks|
|US5841970||27 Jun 1996||24 Nov 1998||Cadix, Inc.||Authentication method for networks|
|US5869819 *||7 Apr 1997||9 Feb 1999||Metrologic Instuments Inc.||Internet-based system and method for tracking objects bearing URL-encoded bar code symbols|
|US5884272 *||6 Sep 1996||16 Mar 1999||Walker Asset Management Limited Partnership||Method and system for establishing and maintaining user-controlled anonymous communications|
|US5898780||9 Oct 1996||27 Apr 1999||Gric Communications, Inc.||Method and apparatus for authorizing remote internet access|
|US5899983||26 Sep 1996||4 May 1999||Siemens Aktiengesellschaft||Method for using electronic information services with guarantee of the anonymity of users in relation to the operators of such services|
|US5903721||13 Mar 1997||11 May 1999||cha|Technologies Services, Inc.||Method and system for secure online transaction processing|
|US5987232||9 Sep 1997||16 Nov 1999||Cadix Inc.||Verification server for use in authentication on networks|
|US5996076||19 Feb 1997||30 Nov 1999||Verifone, Inc.||System, method and article of manufacture for secure digital certification of electronic commerce|
|US6011858 *||10 May 1996||4 Jan 2000||Biometric Tracking, L.L.C.||Memory card having a biometric template stored thereon and system for using same|
|US6070243||13 Jun 1997||30 May 2000||Xylan Corporation||Deterministic user authentication service for communication network|
|US6073106 *||30 Oct 1998||6 Jun 2000||Nehdc, Inc.||Method of managing and controlling access to personal information|
|US6131090||4 Mar 1997||10 Oct 2000||Pitney Bowes Inc.||Method and system for providing controlled access to information stored on a portable recording medium|
|US6157924 *||7 Nov 1997||5 Dec 2000||Bell & Howell Mail Processing Systems Company||Systems, methods, and computer program products for delivering information in a preferred medium|
|US6226744 *||9 Oct 1997||1 May 2001||At&T Corp||Method and apparatus for authenticating users on a network using a smart card|
|US6246994 *||19 Feb 1999||12 Jun 2001||Therightsize, Inc.||System and method for providing standardized individual information|
|US6602185 *||14 Feb 2000||5 Aug 2003||Olympus Optical Co., Ltd.||Remote surgery support system|
|US6609198 *||5 Aug 1999||19 Aug 2003||Sun Microsystems, Inc.||Log-on service providing credential level change without loss of session continuity|
|US6754665 *||13 Jun 2000||22 Jun 2004||Sony Corporation||Information processing apparatus, information processing method, and storage medium|
|US6845448 *||7 Jan 2000||18 Jan 2005||Pennar Software Corporation||Online repository for personal information|
|1||*||Henriksson et al., Security vs. Plug-and-Play for Operation and Maintenance, May 2000, pp. 9-14, obtained from http://epubl.luth.se/1402-1617/2000/139/LTU-EX-00139-SE.pdf.|
|2||*||Parsons Technology Inc. "Power of Attorney", Sep. 9, 1998, pp. 1-5, obtained from http://web.archive.org/web/19991012123139/http://lectlaw.com/filesh/qfl04.htm.|
|3||*||UPS, "UPS OnLine Tracking Information", version 1.3, May 18, 1998, pp. 1-4, obtained from http://web.archive.org/web/19980518023040/ups.com/using/software/online/oltrack<SUB>-</SUB>info.html.|
|4||*||Zimmerman et al., "Building an Intranet with Windows NT 4", Aug. 1996, contents (pp. 1-7), pertinent chapters 2 (pp. 1-17) and 10 (pp. 1-10), obtained from http://www.vanwijk.com/-=%20Bookz%20=-/Building%20An%20Intranet%20With%20Windows%20Nt%204/.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7603701 *||30 Jun 2005||13 Oct 2009||Xerox Corporation||Tools for access to databases via internet protocol networks|
|US7735731||31 Oct 2007||15 Jun 2010||Metrologic Instruments, Inc.||Web-enabled mobile image capturing and processing (MICAP) cell-phone|
|US7753271||30 Oct 2007||13 Jul 2010||Metrologic Instruments, Inc.||Method of and apparatus for an internet-based network configured for facilitating re-labeling of a shipment of packages at the first scanning point employing the capture of shipping document images and recognition-processing thereof initiated from the point of shipment pickup and completed while said shipment is being transported to said first scanning point|
|US7766230||31 Oct 2007||3 Aug 2010||Metrologic Instruments, Inc.||Method of shipping, tracking, and delivering a shipment of packages over an internet-based network employing the capture of shipping document images and recognition-processing thereof initiated from the point of pickup and completed while shipment is being transported to its first scanning point in the network, so as to sort and route packages using the original shipment number assigned to the package shipment|
|US7775431||17 Jan 2007||17 Aug 2010||Metrologic Instruments, Inc.||Method of and apparatus for shipping, tracking and delivering a shipment of packages employing the capture of shipping document images and recognition-processing thereof initiated from the point of shipment pickup and completed while the shipment is being transported to its first scanning point to facilitate early customs clearance processing and shorten the delivery time of packages to point of destination|
|US7798400||30 Oct 2007||21 Sep 2010||Metrologic Instruments, Inc.||Method of and apparatus for shipping, tracking, and delivering a shipment of packages employing the capture of shipping document images and recognition-processing thereof initiated from the point of pickup and completed while shipment is being transported to its first scanning point so as to facilitate early billing processing for shipment delivery|
|US7810724||30 Oct 2007||12 Oct 2010||Metrologic Instruments, Inc.||Method of and apparatus for shipping, tracking, and delivering a shipment of packages employing the capture of shipping document images and recognition-processing thereof initiated from the point of shipment pickup and completed while the shipment is being transported to its first scanning point, to shorten the delivery time of packages to point of destination|
|US7837105||31 Oct 2007||23 Nov 2010||Metrologic Instruments, Inc.||Method of and apparatus for translating shipping documents|
|US7870999||30 Oct 2007||18 Jan 2011||Metrologic Instruments, Inc.||Internet-based shipping, tracking, and delivery network supporting a plurality of mobile digital image capture and processing (MICAP) systems|
|US7883013||31 Oct 2007||8 Feb 2011||Metrologic Instruments, Inc.||Mobile image capture and processing system|
|US7886972||31 Oct 2007||15 Feb 2011||Metrologic Instruments, Inc.||Digital color image capture and processing module|
|US7926088 *||22 Jan 2003||12 Apr 2011||Siemens Aktiengesellschaft||Method for managing data records with person-related contents by means of a computer system|
|US8117313 *||19 Mar 2001||14 Feb 2012||International Business Machines Corporation||System and method for adaptive formatting of image information for efficient delivery and presentation|
|US8175889||5 Apr 2006||8 May 2012||Experian Information Solutions, Inc.||Systems and methods for tracking changes of address based on service disconnect/connect data|
|US8429410 *||2 Jul 2010||23 Apr 2013||Research In Motion Limited||System and method of installing software applications on electronic devices|
|US8478674||30 Sep 2011||2 Jul 2013||Consumerinfo.Com, Inc.||Application clusters|
|US8639920||11 May 2010||28 Jan 2014||Experian Marketing Solutions, Inc.||Systems and methods for providing anonymized user profile data|
|US8744956||24 Aug 2012||3 Jun 2014||Experian Information Solutions, Inc.||Systems and methods for permission arbitrated transaction services|
|US8781953||9 Feb 2010||15 Jul 2014||Consumerinfo.Com, Inc.||Card management system and method|
|US8818888||27 Jun 2013||26 Aug 2014||Consumerinfo.Com, Inc.||Application clusters|
|US8856894||12 Mar 2013||7 Oct 2014||Consumerinfo.Com, Inc.||Always on authentication|
|US8931058||1 Jul 2011||6 Jan 2015||Experian Information Solutions, Inc.||Systems and methods for permission arbitrated transaction services|
|US8966649||23 Jan 2014||24 Feb 2015||Experian Marketing Solutions, Inc.||Systems and methods for providing anonymized user profile data|
|US9147042||22 Nov 2011||29 Sep 2015||Experian Information Solutions, Inc.||Systems and methods for data verification|
|US9256904||14 Aug 2009||9 Feb 2016||Experian Information Solutions, Inc.||Multi-bureau credit file freeze and unfreeze|
|US9342783||14 Sep 2012||17 May 2016||Consumerinfo.Com, Inc.||Systems and methods for data verification|
|US9489694||4 Feb 2016||8 Nov 2016||Experian Information Solutions, Inc.||Multi-bureau credit file freeze and unfreeze|
|US9529851||26 Nov 2014||27 Dec 2016||Experian Information Solutions, Inc.||Server architecture for electronic data quality processing|
|US9542553||6 Aug 2015||10 Jan 2017||Consumerinfo.Com, Inc.||Systems and methods of identity protection and management|
|US9558519||29 Apr 2011||31 Jan 2017||Consumerinfo.Com, Inc.||Exposing reporting cycle information|
|US9595051||20 Feb 2015||14 Mar 2017||Experian Marketing Solutions, Inc.||Systems and methods for providing anonymized user profile data|
|US20020131072 *||19 Mar 2001||19 Sep 2002||International Business Machines Corporation||System and method for adaptive formatting of image information for efficient delivery and presentation|
|US20030196124 *||22 Jan 2003||16 Oct 2003||Thomas Birkhoelzer||Method for managing data records with person-related contents by means of a computer system|
|US20040177270 *||20 Feb 2004||9 Sep 2004||Little Herbert A.||System and method of multiple-level control of electronic devices|
|US20050027713 *||1 Aug 2003||3 Feb 2005||Kim Cameron||Administrative reset of multiple passwords|
|US20070005601 *||30 Jun 2005||4 Jan 2007||Xerox Corporation||Tools for access to databases via internet protocol networks|
|US20080169343 *||30 Oct 2007||17 Jul 2008||Ole-Petter Skaaksrud||Internet-based shipping, tracking, and delivery network supporting a plurality of digital image capture and processing intruments deployed at a plurality of pickup and delivery terminals|
|US20080172303 *||17 Jan 2007||17 Jul 2008||Ole-Petter Skaaksrud||Internet-based shipping, tracking and delivery network and system components supporting the capture of shipping document images and recognition-processing thereof initiated from the point of pickup and completed while shipment is being transported to its first scanning point in the network so as to increase velocity of shipping information through network and reduce delivery time|
|US20080173706 *||30 Oct 2007||24 Jul 2008||Ole-Petter Skaaksrud||Internet-based shipping, tracking and delivery network and system components supporting the capture of shipping document images and recognition-processing thereof initiated from the point of pickup and completed while shipment is being transported to its first scanning point in the network so as to increase velocity of shipping information through network and reduce delivery time|
|US20080173710 *||31 Oct 2007||24 Jul 2008||Ole-Petter Skaaksrud||Digital color image capture and processing module|
|US20080179398 *||31 Oct 2007||31 Jul 2008||Ole-Petter Skaaksrud||Method of and apparatus for translating shipping documents|
|US20080203147 *||30 Oct 2007||28 Aug 2008||Ole-Petter Skaaksrud||Internet-based shipping, tracking, and delivery network supporting a plurality of mobile digital image capture and processing (MICAP) systems|
|US20080203166 *||31 Oct 2007||28 Aug 2008||Ole-Petter Skaaksrud||Web-enabled mobile image capturing and processing (MICAP) cell-phone|
|US20080210749 *||30 Oct 2007||4 Sep 2008||Ole-Petter Skaaksrud||Internet-based shipping, tracking, and delivering network supporting a plurality of mobile digital image capture and processing instruments deployed on a plurality of pickup and delivery couriers|
|US20080210750 *||31 Oct 2007||4 Sep 2008||Ole-Petter Skaaksrud||Internet-based shipping, tracking, and delivery network supporting a plurality of digital image capture and processing instruments deployed aboard a plurality of pickup/delivery vehicles|
|US20080285091 *||31 Oct 2007||20 Nov 2008||Ole-Petter Skaaksrud||Mobile image capture and processing system|
|US20090070865 *||25 Feb 2008||12 Mar 2009||Robert Cahn||Security proxy service|
|US20100275029 *||2 Jul 2010||28 Oct 2010||Research In Motion Limited||System and method of installing software applications on electronic devices|
|US20110126274 *||12 Oct 2009||26 May 2011||Sadeckas Robert E||Systems and processes for securing sensitive information|
|U.S. Classification||726/10, 726/28, 713/185|
|International Classification||G06Q50/24, G06Q50/32, G06Q20/02, G06F21/00, H04L9/32|
|Cooperative Classification||G06F21/33, G06F21/6245, G06Q10/083, G06Q10/08, G06F21/6272|
|European Classification||G06Q10/08, G06F21/62B5, G06F21/33, G06F21/62B7, G06Q10/083|
|24 Sep 2001||AS||Assignment|
Owner name: UNITED PARCEL SERVICE OF AMERICA, INC., GEORGIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VOGEL, ROBERT;FRANZ, DANIEL;KLINGENBERG, ROBERT;AND OTHERS;REEL/FRAME:012213/0501
Effective date: 20010907
|24 Nov 2010||FPAY||Fee payment|
Year of fee payment: 4
|19 Nov 2014||FPAY||Fee payment|
Year of fee payment: 8